Method for evaluating information safety risk based on interval number and ideal solution

A risk assessment and information security technology, applied in the field of information security risk assessment based on interval numbers and ideal solutions, can solve problems such as more professional opinions not being taken seriously, and achieve the effect of reasonable information

Inactive Publication Date: 2017-01-04
HUBEI UNIV OF TECH
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2) There is no individual difference analysis for the experts who provided the data, and all opinions adopt the same degree of recognition, so that more professional opinions are not taken seriously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for evaluating information safety risk based on interval number and ideal solution
  • Method for evaluating information safety risk based on interval number and ideal solution
  • Method for evaluating information safety risk based on interval number and ideal solution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to better understand the present invention, the content of the present invention is further illustrated below in conjunction with the examples, but the content of the present invention is not limited to the following examples. Those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms are also within the scope of the claims listed in this application.

[0043] The present invention adopts a factor layered framework structure, which decomposes each factor affecting information security risk assessment in a more detailed and reasonable manner, and its schematic diagram is as follows figure 1 shown.

[0044] figure 1 The medium risk comprehensive value is an index to measure the security risk level of the information system, which is jointly determined by the possibility of security incidents and the losses caused, and its calculation formula is:

[0045] Risk composite value = R(P, I) (Formula 1)

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for evaluating information safety risk based on interval number and ideal solution. The method comprises the following steps of establishing a new evaluation matrix form, wherein the rows and lines of the evaluation matrix are used for respectively expressing an expert set and a factor set; presenting the expert evaluation comments in the interval number form, and filling the matrix; in addition, introducing the index of correlation degree with the ideal solution, and sequencing the authority of the expert comments by technique for order preference by similarity to ideal solution; finally, performing compound operation on the factor evaluation computed by the comprehensive expert comments and the factor weight computed by the analytic hierarchy process, so as to obtain the integral comprehensive evaluation. The method has the advantages that a model for fuzzy comprehensive evaluation based on interval number is studied, the new single factor evaluation matrix form containing more information is proposed, the information involved in the evaluation process is furthest remained by the matrix, and the defect of losing of expert information of the existing model is overcome.

Description

technical field [0001] The invention relates to an information security risk assessment method, in particular to an information security risk assessment method based on interval numbers and ideal solutions. Background technique [0002] At present, there are many methods of information security risk assessment, and the risk assessment model based on fuzzy comprehensive evaluation method belongs to one of the important types. Xie Jijian, Liu Chengping published "Fuzzy Mathematical Method and Its Application" (Fourth Edition) [M]. Wuhan: Huazhong University of Science and Technology Press, 2013: 149-164, summarizing the most basic fuzzy comprehensive evaluation model, which requires Two sets of important parameters are determined: factor evaluation and factor weight. The initial values ​​of these two groups of parameters are obtained by collecting the opinions of evaluators, which leads to subjective errors in the evaluation results. In order to improve this shortcoming, some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06N5/04
CPCG06F21/55G06F2221/034G06N5/04
Inventor 张正文陈卓邹华莎何林海刘陈
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products